Full (ISC)² CCSP Recorded course

Cloud computing drives businesses today. At least at some level for each. The Certified Cloud Security Professional (CCSP) exam is growing at a rate that matched CISSPs early growth. Understanding what it takes to secure the cloud today is essential for information security professionals.

If you already have your CISSP this exam gets easier. I

Main Features

  • Achieve Hollywood be
  • Wit

What is the target audience?

  • This course is intended for people that are preparing for the (ISC)2 CCSP exam.
  • This course would benefit anyone working to expand their knowledge and understanding of the cloud concepts, architecture and design.
  • This course would benefit anyone working to expand their knowledge and understanding of the cloud data security.
  • This course would benefit anyone working to expand their knowledge and understanding of the cloud platform and its infrastructure.

What are the prerequisites?

  • There are no requirements.
  • A desire to learn what you need to know about the cloud data security for the CCSP exam is very beneficial to have.
  • A basic understanding of information security is recommended.

Domain 1

1
Introduction
9:20 Min

Welcome to Domain 1! The first thing I highly recommend is that you should download the Cloud Security Alliance's (CSA) Guidance 4.0 document. This exam is a joint venture between (ISC)2 and the CSA. It is very useful to read this document.

Not all of it right this moment, rather across this whole course. Start now by browsing the table of contents.

2
Governance, Risk Management
16:59 Min

Governance, Risk Management & Compliance.

3
Service Models
22:43 Min

Service Models.

4
The cloud and its contracts
5:41 Min

The cloud and its contracts.

5
Building the cloud
27:21 Min

Building the cloud.

6
Securing the cloud
11:42 Min

Securing the cloud.

7
Control verification
12:12 Min

Control verification.

8
Threats to the Cloud
21:15 Min

Threats to the Cloud.

9
Related technologies
14:12 Min

Related technologies.

10
Forensics Introduction
7:28 Min

Forensics Introduction.

Domain 2

1
Introduction to Data Security
6:40 Min

Introduction to Data Security.

2
Cloud Data Lifecycle
13:30 Min

Cloud Data Lifecycle.

3
Data Protection Policy
3:08 Min

Data Protection Policy.

4
Data Classification
13:52 Min

Data Classification.

5
Data Science
7:38 Min

Data Science.

6
Data Governance
2:39 Min

Data Governance.

7
Structured Data - DB & Data Warehouse
6:10 Min

Structured Data - DB & Data Warehouse.

8
Unstructured data - Big Data
8:37 Min

Unstructured data - Big Data.

9
Data Storage
9:26 Min

Data Storage.

10
Data Dispersion
6:50 Min

Data Dispersion.

11
Application Programming Interface (API)
5:28 mIN

Application Programming Interface (API).

12
Introduction to Encryption
5:33 Min

Introduction to Encryption.

13
Encrypting Data In Use
2:19 Min

Encrypting Data In Use.

14
Encrypting Data at Rest
1:54 Min

Encrypting Data at Rest.

15
Encrypting Data in Transit SSH
4:34 Min

Encrypting Data in Transit SSH.

16
Encrypting Data in Transit: TLS
2:31 Min

Encrypting Data in Transit: TLS.

17
Encrypting Data in Transit: IPSec
3:29 Min

Encrypting Data in Transit: IPSec.

18
Symmetric Encryption
1:59 Min

Symmetric Encryption.

19
Intro to Asymmetric Encryption
7:05 Min

Intro to Asymmetric Encryption.

20
Use of Public & Private Keys
4:14 Min

Use of Public & Private Keys.

21
Hashing
5:10 Min

Hashing.

22
Key Storage Location
11:27 Min

Key Storage Location.

23
Key Management
11:03 Min

Key Management.

24
PKI
10:34 Min

PKI.

25
Key storage hardware
3:59 Min

Key storage hardware.

26
Masking
5:12 Min

Masking.

27
Tokenization
3:32 Min

Tokenization.

28
Obfuscation
3:40 Min

Obfuscation.

29
Anonymization
7:30 Min

Anonymization.

30
Maturity Models
8:58 Min

Maturity Models.

31
DRM & IRM
5:04 Min

DRM & IRM.

32
Emerging Technologies
7:28 Min

Emerging Technologies.

Domain 3

1
Intro to Platform & Infrastructure
10:59 Min

Intro to Platform & Infrastructure.

2
Architecture
7:15 Min

Architecture.

3
Compute, Storage and Network
7:57 Min

Compute, Storage and Network.

4
Intro to Networking and Switches
9:36 Min

Intro to Networking and Switches.

5
VLAN & Virtualized LAN
3:49 Min

VLAN & Virtualized LAN.

6
IP and Routers
8:22 Min

IP and Routers.

7
Software Defined Network
11:43 Min

Software Defined Network.

8
Content Defined Network
4:21 Min

Content Defined Network.

9
Virtual Private Network
2:55 Min

Virtual Private Network.

10
DNS & DNSSec
8:22 Min

DNS & DNSSec.

11
OS Hardening
5:49 Min

OS Hardening.

12
DRS & DO
9:35 Min

DRS & DO.

13
NSG and SAN
10:29 Min

NSG and SAN.

14
Fibre Channel - Part 1
10:42

Fibre Channel - Part 1.

15
Fibre Channel - Part 2
5:57

Fibre Channel - Part 2.

16
Data Storage
4:38 Min

Data Storage.

17
RAID & Erasure Coding
7:14 Min

RAID & Erasure Coding.

18
Egregious 11 - 1-5
9:11 Min

Egregious 11 - 1-5.

19
Egregious 11 - 6-11
13:28 Min

Egregious 11 - 6-11.

20
Treacherous 12
11:14 Min

Treacherous 12.

21
Risk Appetite
5:11 Min

Risk Appetite.

22
Risk Tolerance
4:24 Min

Risk Tolerance.

23
Basic Risk Terms
4:24 Min

Basic Risk Terms.

24
Quantitative Risk Assessment
5:42 Min

Quantitative Risk Assessment.

25
Qualitative Risk Assessment
6:17 Min

Qualitative Risk Assessment.

26
Risk Response
8:49 Min

Risk Response.

27
Basic IAAA Introduction
8:39 Min

Basic IAAA Introduction.

28
Authorization and RBAC
8:46 Min

Authorization and RBAC.

29
Attribute based access control
3:26 Min

Attribute based access control.

30
Single Sign-On
4:31 Min

Single Sign-On.

31
SAML
7:45 Min

SAML.

32
OAuth, OpenID, & WS-Federation
6:54 Min

OAuth, OpenID, & WS-Federation.

33
CASB
6:06 Min

CASB.

34
Firewalls
10:52 Min

Firewalls.

35
IDS & IPS
11:40 Min

IDS & IPS.

36
Micro-Segmentation
5:45 Min

Micro-Segmentation.

37
Hyper-Segmentation
2:52 Min

Hyper-Segmentation.

38
Blast Radius
3:04 Min

Blast Radius.

39
Activity Monitor
6:24 Min

Activity Monitor.

40
DLP
5:22 Min

DLP

41
Data Center Tiers
4:00 Min

Data Center Tiers.

42
Hot & Cold Air Aisles
1:51 Min

Hot & Cold Air Aisles.

43
BCM Introduction
10:45 Min

BCM Introduction.

44
Beginning of BCP/DRP planning
2:13 Min

Beginning of BCP/DRP planning.

45
BIA part 1 Risk Assessments
5:14 Min

BIA part 1 Risk Assessments.

46
BIA part 2 MTD to RTO
9:21 Min

BIA part 2 MTD to RTO.

47
BIA part 3 RTO to RPO
5:01 Min

BIA part 3 RTO to RPO.

48
BIA part 4 SDO and RSL
3:35 Min

BIA part 4 SDO and RSL.

49
Cloud Recovery Strategies
3:26 Min

Cloud Recovery Strategies.

50
Document and Test the plan
6:38 Min

Document and Test the plan.

51
Embed in the Community
2:22 Min

Embed in the Community.

Domain 6

1
Introduction to the Legal Domain
11:20 Min

Introduction to the Legal Domain.

2
Basic Cloud Forensics
6:35 Min

Basic Cloud Forensics.

3
Privacy laws and regulations
6:31

Privacy laws and regulations.

4
Basic forensic rules
5:50

Basic forensic rules.

5
GDPR
14:20 Min

GDPR.

6
Other Privacy Laws
6:26 Min

Other Privacy Laws.

7
Privacy Management Framework and Maturity Models
5:49 Min

Privacy Management Framework and Maturity Models.

8
FedRAMP & CLOUD Act
7:37 Min

FedRAMP & CLOUD Act.

9
Introduction to PCI
4:57 Min

Introduction to PCI.

10
PCI Requirements 1-3
4:34 Min

PCI Requirements 1-3.

11
PCI Requirements 4-6
4:26 Min

PCI Requirements 4-6.

12
PCI Requirements 7-12
6:10 Min

PCI Requirements 7-12.

13
ITAR & EAR
2:12 Min

ITAR & EAR.

14
Industrial Control Systems
7:21

Industrial Control Systems.

15
Audits and SOC reports
14:28

Audits and SOC reports.

16
Gap analysis and CSA STAR, CCM & CAIQ
2:09 Min

Gap analysis and CSA STAR, CCM & CAIQ.

17
CSA Star and CCM
9:05 Min

CSA Star and CCM.

18
Risk appetite and risk profile.
5:11

Risk appetite and risk profile.

19
Risk Tolerance
4:23

Risk Tolerance.

20
Basic Risk Terminology
4:24

Basic Risk Terminology.

21
Quantitative Risk Assessment
5:42

Quantitative Risk Assessment.

22
Qualitative Risk Assessment
6:18

Qualitative Risk Assessment.

23
Risk Response
8:49

Risk Response.

24
Forensics Introduction
7:28 Min

Forensics Introduction.

25
Basic Cloud Forensics
6:35 Min

Basic Cloud Forensics.

26
E-Discovery
8:41

E-Discovery

Domain 4

1
Introduction & What is Clean Code
7:46 Min

Introduction & What is Clean Code.

2
Software Development Life Cycle (SDLC)
5:42 min

Software Development Life Cycle (SDLC).

3
Supply Chain Management
3:15 Min

Supply Chain Management.

4
Software Development Methodologies
6:10 Min

Software Development Methodologies.

5
DevOps Practices
9:13 Min

DevOps Practices.

6
Extra -My thoughts numbers 4 the test
2:22 Min

Extra -My thoughts numbers 4 the test.

7
CI/CD and DevSecOps
3:44 Min

CI/CD and DevSecOps.

8
Software Verification & Validation
4:01 Min

Software Verification & Validation.

9
Software Testing
8:33 Min

Software Testing.

Domain 5

1
Introduction to Cloud Operations
1:22 Min

Introduction to Operations.

2
Building Secure Data Center
10:34

Building Secure Data Center.

3
Manage Cloud Environment /DC
5:38 Min

Manage Cloud Environment /DC.

4
Patch Management
3:23 Min

Patch Management.

5
Firewalls & Network Security Groups
4:41 Min

Firewalls & Network Security Groups.

6
IDS & IPS
4:17 Min

IDS & IPS.

7
ITIL & ISO/IEC 20000
5:49 Min

ITIL & ISO/IEC 20000.

8
ITIL Continuity, Incident and Problem management
7:49 Min

ITIL Continuity, Incident and Problem management.

9
Security Operations Center (SOC)
4:56 Min

Security Operations Center (SOC).

10
Logging
10:13 Min

Logging.

11
Packet Capture
9:27 Min

Packet Capture.

12
Data Center Tiers 1 & 2
4:32 Min

Data Center Tiers 1 & 2.

13
Data Center Tiers 3 & 4
3:21 Min

Data Center Tiers 3 & 4.

14
Honeypots
4:20 Min

Honeypots.

15
Vulnerability Assessments & Pen Testing
8:23 Min

Vulnerability Assessments & Pen Testing.

16
Penetration Testing Process
9:31 Min

Penetration Testing Process.

17
Data & Media Sanitization
8:35 Min

Data & Media Sanitization.

18
Business Continuity Management
3:29 Min

Business Continuity Management.

19
BCM - Issues
9:10 Min

BCM - Issues.

20
Business Continuity Plans - Policy
1:25 Min

Business Continuity Plans - Policy.

21
Project Management & Initiation
1:47 Min

Project Management & Initiation.

22
BIA - MTD to Disaster Declaration
8:38 Min

BIA - MTD to Disaster Declaration.

23
BIA - RTO to RPO
4:30 Min

BIA - RTO to RPO.

24
BIA - SDO and RSL
3:50 Min

BIA - SDO and RSL.

25
Disaster Recovery Strategies
3:22

Disaster Recovery Strategies.

26
Document the Plan
0:38 Min

Document the Plan.

27
Implement, Test and Update
7:47 Min

Implement, Test and Update.

28
Embed in the User Community
2:18 Min

Embed in the User Community.

Be the first to add a review.

Please, login to leave a review
Get course
Enrolled: 164 students
Lectures: 156
Level: Intermediate